[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [seabios baseline-only test] 38631: trouble: broken/fail/pass

This run is configured for baseline tests only.

flight 38631 seabios real [real]

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-qemuu-rhel6hvm-intel  3 host-install(3) broken REGR. vs. 38610

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1             fail like 38610
 test-amd64-amd64-xl-qemuu-winxpsp3  9 windows-install          fail like 38610

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop              fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail never pass

version targeted for testing:
 seabios              44250252eeaefd5e81bae2f73639bd323682217b
baseline version:
 seabios              3c577a7644c6c91be70ffd59c121b5d19d381e5f

Last test of basis    38610  2016-01-09 12:58:02 Z    4 days
Testing same since    38631  2016-01-13 07:57:35 Z    0 days    1 attempts

People who touched revisions under test:
  Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

 build-amd64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-qemuu-nested-intel                          fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         broken  
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-amd64-i386-xl-qemuu-winxpsp3                            pass    

sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at

Test harness code can be found at

broken-step test-amd64-i386-qemuu-rhel6hvm-intel host-install(3)

Push not applicable.

commit 44250252eeaefd5e81bae2f73639bd323682217b
Author: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jan 7 12:02:51 2016 -0500

    tpm: Do not set TPM in failure mode if menu command fails
    Since we may detect that HW physical presence is enabled but we do not 
    whether it is actually asserted, we may fail on the TPM menu commands that
    require the assertion of physical presence. We therefore cannot set the TPM
    into failure mode if we hit this case. Failure should never occur in these
    cases if SW physical presence has been asserted.
    Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

commit 8b902b88ea239d2193e78f0c425a180b6e3a24f0
Author: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jan 7 12:02:50 2016 -0500

    tpm: Remove usage of PP_CMD_ENABLE from all but one place
    Remove the usage of PhysicalPresence_CMD_ENABLE from all but
    the assert_physical_presence function.
    Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

commit 115d0084831b1e9e085d8fe49fa9e4ea21542464
Author: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jan 7 12:02:49 2016 -0500

    tpm: Rework the assertion of physical presence
    Rework the assertion of physical presence by calling 
    in tpm_setup. This call will assert physical presence if SW assertion is
    possible or by checking whether HW physical presence is enabled.
    The TPM menu will only be shown if physical presence is asserted or HW
    physical presence is enabled after this call.
    Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

commit a2206d30aed52722ce708519ef7b31d88330d515
Author: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jan 7 12:02:48 2016 -0500

    tpm: Add support for harware physical presence
    Extend assert_physical_presence with checks for hardware physical presence
    support. If hardware physical presence is enabled, we return 0.
    Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

commit e55e37f4ba4ff8ebfc68ab7694245e475d646b84
Author: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jan 7 12:02:47 2016 -0500

    tpm: Move assert_physical_presence and dependencies
    Move assert_physical_presence and dependencies in front of tpm_startup
    so that the next patches can assert physical presence after TPM_ORD_Startup
    Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

commit 2b237501077d9dcdb9c9ba8cd7aaabdd4a531e80
Author: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Date:   Thu Jan 7 12:02:46 2016 -0500

    tpm: Copy digest into HashLogExentEvent response
    Copy the digest into the response of a HashLogExtendEvent API call.
    Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.